Title
Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems
Abstract
Wearable Internet-of-Things (WIoT) environments have demonstrated great potential in a broad range of applications in healthcare and well-being. Security is essential for WIoT environments. Lack of security in WIoTs not only harms user privacy, but may also harm the user's safety. Though devices in the WIoT can be attacked in many ways, in this paper we focus on adversaries who mount what we call sensor-hijacking attacks, which prevent the constituent medical devices from accurately collecting and reporting the user's health state (e.g., reporting old or wrong physiological measurements). In this paper we outline some of our experiences in implementing a data-driven security solution for detecting sensor-hijacking attack on a secure wearable internet-of-things (WIoT) base station called the Amulet. Given the limited capabilities (computation, memory, battery power) of the Amulet platform, implementing such a security solution is quite challenging and presents several trade-offs with respect to detection accuracy and resources requirements. We conclude the paper with a list of insights into what capabilities constrained WIoT platforms should provide developers so as to make the inclusion of data-driven security primitives in such systems.
Year
DOI
Venue
2017
10.1109/ICDCSW.2017.15
2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW)
Keywords
Field
DocType
Wearable IoT,Data-driven security solution,Resource constrained
Base station,Data-driven,Wearable computer,Computer security,Computer science,Harm,Internet of Things,User privacy
Conference
ISSN
ISBN
Citations 
1545-0678
978-1-5386-3293-2
0
PageRank 
References 
Authors
0.34
5
4
Name
Order
Citations
PageRank
Hang Cai1102.66
Tianlong Yun2142.64
Josiah D. Hester313818.13
Krishna K. Venkatasubramanian454540.67